Static task
static1
Behavioral task
behavioral1
Sample
d79b50a1e3c952095af06046a8753831.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d79b50a1e3c952095af06046a8753831.exe
Resource
win10v2004-20240226-en
General
-
Target
d79b50a1e3c952095af06046a8753831
-
Size
18KB
-
MD5
d79b50a1e3c952095af06046a8753831
-
SHA1
6657068b1694f642d398b76c21c42cedb0ca9e30
-
SHA256
611eef7fe3ec1b604c1347b7d3d0e621b748d37eea37916a3fe067ee4e851093
-
SHA512
992876f665debc295ca94f050929726e0d3247ed4e68a23fb9b52c37e26704d40bfffd55d00a5cc95428030eede4861717a61ebaf134f93363c617a6011250de
-
SSDEEP
384:9cd6w+NomiUBQZVoRiCKKtYh2pNvdAajICjDfLAqjC4l3VN:qIomvQ7oTOUVAaMSEq2W3/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d79b50a1e3c952095af06046a8753831
Files
-
d79b50a1e3c952095af06046a8753831.exe windows:4 windows x86 arch:x86
d212f4856ef91a73d17f9e9cdf7752bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ShowWindow
PostQuitMessage
DefWindowProcW
SendMessageW
LoadIconW
LoadCursorW
DispatchMessageW
GetMessageW
CreateWindowExW
RegisterClassExW
ClientToScreen
CloseClipboard
PostMessageW
CharLowerW
UpdateWindow
ChangeClipboardChain
kernel32
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetModuleHandleW
HeapAlloc
GetProcessHeap
lstrcatW
HeapFree
lstrcpyW
GetCommandLineA
comctl32
ImageList_Create
ord17
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 456B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ